{"id":9908,"date":"2023-01-19T17:48:53","date_gmt":"2023-01-19T15:48:53","guid":{"rendered":"https:\/\/www.kappadata.nl\/?page_id=9908"},"modified":"2023-03-02T12:01:19","modified_gmt":"2023-03-02T10:01:19","slug":"zero-trust-network-access","status":"publish","type":"page","link":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/","title":{"rendered":"Zero-Trust (Network Access)"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1672654277901{background-image: url(https:\/\/www.kappadata.be\/wp-content\/uploads\/2022\/11\/Fotos-banners-overlay-01.jpg?id=13234) !important;}&#8221; z_index=&#8221;&#8221;][vc_column][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 10% 10%&#8221;][vc_column_text]<\/p>\n<h1>Zero<span data-ccp-parastyle=\"heading 1\">&#8211;<\/span><span data-ccp-parastyle=\"heading 1\">Trust <\/span><span data-ccp-parastyle=\"heading 1\">(<\/span><span data-ccp-parastyle=\"heading 1\">Network Access<\/span><span data-ccp-parastyle=\"heading 1\">)<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240}\">\u00a0<\/span><\/h1>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h3><span style=\"color: #ffffff;\">Secure your corporate network against cybercriminals using Zero Trust Network Access.<\/span><\/h3>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;80px&#8221; el_class=&#8221;onlyphone&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_color=&#8221;#f3f3f3&#8243; padding_top=&#8221;20&#8243;][vc_column css=&#8221;.vc_custom_1604415412261{margin-top: -100px !important;}&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; custom_class=&#8221;cardstatic&#8221; background_color=&#8221;#ffffff&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h2>Zero<span data-ccp-parastyle=\"heading 1\">&#8211;<\/span><span data-ccp-parastyle=\"heading 1\">Trust <\/span><span data-ccp-parastyle=\"heading 1\">(<\/span><span data-ccp-parastyle=\"heading 1\">Network Access<\/span><span data-ccp-parastyle=\"heading 1\">)<\/span><span data-ccp-props=\"{&quot;335559738&quot;:240}\">\u00a0<\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<h3>What is Zero Trust?<span data-ccp-props=\"{&quot;335559738&quot;:40}\">\u00a0<\/span><\/h3>\n<p>In a nutshell, Zero Trust assumes that every user, device and service that attempts to connect to a network or application is hostile until proven otherwise. The fundamental principle of Zero Trust is to secure an organization&#8217;s data wherever it resides. Only legitimate users, devices and entities are granted access to relevant data sources and assets.<\/p>\n<p>Zero Trust addresses security issues an organization faces when it stores data in multiple locations, both within its own network and in private and public cloud environments, and allows broad access to that data by employees, contractors, partners, vendors and other authorized users, who use their own devices over which the organization has no direct control.\u00a0\u00a0Zero Trust itself is not a specific security architecture, product or software solution, but rather a methodology for secure access that requires an organization to rethink its security strategy and network architecture. The key to zero trust is understanding who is requesting access, what device the request is coming from, and then linking that request to an access policy by application or asset.<\/p>\n<p>Essentially, Zero Trust is a whitelist method for granting access to specific enterprise applications based on the identity of the user, the device being used and the behavior or context within which it occurs.<\/p>\n<h3><strong><span data-ccp-parastyle=\"heading 2\">What are the basic principles of the zero trust model?<br \/>\n<\/span><\/strong><\/h3>\n<p><em><strong>The network is always hostile<\/strong><\/em>: before zero trust, it was assumed that if you connect to a known network, you could be fairly certain that the network is secure. From the zero trust principle, a known network is inherently insecure.<\/p>\n<p><em><strong>Accept that external and internal threats are always on the network:<\/strong><\/em> traditional cybersecurity assumed that the network was secure until a threat was detected. Zero trust turns this model on its head.<\/p>\n<p><em><strong>Knowing the location of the corporate network or cloud provider is not enough to trust a network<\/strong><\/em>: traditional security rules based on IP addresses are no longer secure.<\/p>\n<p><strong><em>Authenticate and authorize every device, user and network flow<\/em><\/strong>: a zero trust model authorizes and authenticates user access through per-session least-privilege access.<\/p>\n<p><em><strong>Implement a security policy that is dynamic and holistic<\/strong><\/em>: data analytics should be based on as many data sources as possible. These provide monitoring and proactive threat detection across the architecture.<\/p>\n<h3><strong><span data-ccp-parastyle=\"heading 2\">Zero Trust Network Access<\/span><\/strong><\/h3>\n<p>Zero Trust Network Access is a concrete implementation of the Zero Trust Security model:<\/p>\n<ul>\n<li>User identity gets even better In addition to traditional login credentials and multi-factor authentication, now the device is also part of the identity.<\/li>\n<li>The security status of the device is checked before access can be granted to the requested resources. A distinction can also be made between corporate and private devices. Some solutions mandate the use of Mobile Device Management.<\/li>\n<li>Access is granted only to those applications and resources to which you are authorized, and this according to the &#8216;least privilege&#8217;.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][vc_empty_space height=&#8221;25px&#8221;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#ffffff&#8221; custom_class=&#8221;cardstatic&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h2>Barracuda Networks<\/h2>\n<p>[\/vc_column_text][vc_column_text]<a href=\"https:\/\/www.kappadata.be\/en\/vendors\/barracuda\/\">Barracuda&#8217;s<\/a> ZTNA solution is a mobile first and BYOD first solution that can be used without MDM dependency.<\/p>\n<p>The CGA (CloudGen Access) integrates with your existing IAM \/ Single-Sign-On solution (Azure AD, Google Suite, One Identity, Okta, SAML, &#8230;), enabling a quick implementation. All applications that use this underlying authentication are now controlled by CGA.<\/p>\n<p>To access these applications, the user needs a CGA client on their device. This client is available for all types of mobile devices and operating systems imaginable. As soon as the user accesses a secure application, all zero-trust checks are performed by CGA and a tunnel specific to this application is built to a proxy (mTLS).<\/p>\n<p>The CGA client intercepts all DNS requests from the device. This allows not only detection and control of the use of the enterprise application, but also Web (URL filtering) and DNS security. So it is ideal for your employees to work securely anywhere.<\/p>\n<h3><span data-ccp-props=\"{}\">The CloudGen Access offers the following benefits:<br \/>\n<\/span><\/h3>\n<ul>\n<li>Replace your traditional VPN (read: access to your entire network) with a Zero-Trust solution that only allows access to specific applications and resources without impacting client performance and battery.<\/li>\n<li>Provide contextual access using policies based on the role of the user or based on different attributes (RBAC\/ABAC)<\/li>\n<li>Ideal solution to give both employees, contractors and partners just the access they need<\/li>\n<li>Your data remains yours at all times and does not leave your network<\/li>\n<li>Add an extra layer of security against phishing attacks thanks to DNS Security at the level of the user&#8217;s device<\/li>\n<li>URL and content filtering using web categories at the level of the user&#8217;s device<\/li>\n<li>Compliancy: gain control and insight into who is using which applications, when and with which devices (PCI-DSS, NIST-800, HIPAA)<\/li>\n<li>Easy management even in complex, multi-cloud and hybrid environments<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#ffffff&#8221; custom_class=&#8221;cardstatic&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h2><span class=\"TextRun SCXW266954168 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW266954168 BCX0\" data-ccp-parastyle=\"heading 2\">Cato Networks<\/span><span class=\"NormalTextRun SCXW266954168 BCX0\" data-ccp-parastyle=\"heading 2\"> SDP<\/span><\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text]<span data-contrast=\"auto\"><a href=\"https:\/\/www.kappadata.be\/vendors\/cato-networks\/\">Cato Networks <\/a><\/span>offers an integrated client-based and clientless remote access solution as part of the Cato Cloud. Users benefit from optimized and secure access to all on-premises and cloud-based applications while at home or on the road. Cato enforces strong authentication and granular access control, as well as deep packet inspection of all traffic against threats. Cato&#8217;s cloud-scale global platform seamlessly supports any number of users and applications worldwide.<\/p>\n<p>A client is installed on the user&#8217;s mobile device. This tunnels all traffic to the nearest Cato Cloud dial-up point.<\/p>\n<p>Within the Cato Cloud, security policies are applied and the user is given access to those resources and applications they are entitled to. Internet traffic is also subjected to deep packet inspection. In short, the ideal solution to give your users secure and high-performance access to the Internet and the authorized applications.<\/p>\n<h3><span data-ccp-props=\"{}\">The benefits:<br \/>\n<\/span><\/h3>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Secure access and authentication: Cato Cloud enforces multi-factor authentication and applies granular policies to access approved on-premise and cloud applications. Users are never granted unlimited access to the network layer.<\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Scalability: the ZTNA is an integral part of the Cato Cloud, a global cloud architecture that scales with all your users, no matter where they are located.<\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Permanent threat prevention by applying &#8220;deep packet inspection&#8221; to all traffic, not only from the applications, but also to all user Internet traffic.<\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Optimal end-to-end performance thanks to Cato&#8217;s global private backbone, delivering a consistent and optimized user experience.<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#ffffff&#8221; custom_class=&#8221;cardstatic&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h2><span class=\"TextRun SCXW209671329 BCX0\" lang=\"NL-BE\" xml:lang=\"NL-BE\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW209671329 BCX0\" data-ccp-parastyle=\"heading 2\">Sophos<\/span><span class=\"NormalTextRun SCXW209671329 BCX0\" data-ccp-parastyle=\"heading 2\"> ZTNA<\/span><\/span><\/h2>\n<p>[\/vc_column_text][vc_column_text]<span class=\"TextRun SCXW148916724 BCX0\" lang=\"NL-BE\" xml:lang=\"NL-BE\" data-contrast=\"auto\"><a href=\"https:\/\/www.kappadata.be\/vendors\/sophos\/\"><span class=\"NormalTextRun SCXW148916724 BCX0\">Sophos<\/span>\u00a0<\/a><\/span>is best known for its powerful nextgen endpoint security solution: Intercept X. If you are already using this solution, all you have to do is activate the ZTNA functionality in the central management portal and you don&#8217;t need to install any additional client software. ZTNA and Intercept X work closely together to secure access to applications and are in constant dialogue with each other. Thanks to this synchronized security, compromised systems are automatically isolated from applications and the network.<\/p>\n<h3><span data-ccp-props=\"{}\">The benefits:<br \/>\n<\/span><\/h3>\n<ul>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Central cloud management platform<\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Synchronized protection between the different security solutions of Sophos: ZTNA, Endpoint, Firewall, Wireless, Mobile and Server<\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Deploy the ZTNA agent alongside your endpoint protection with just one mouse click<\/li>\n<li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"4\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\">Get at-a-glance visibility into your application activity and security status<\/li>\n<\/ul>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][\/vc_column_inner][\/vc_row_inner][vc_empty_space height=&#8221;75px&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_color=&#8221;#f3f3f3&#8243; padding_top=&#8221;75&#8243; css=&#8221;.vc_custom_1603192215592{background-color: #ffffff !important;}&#8221; padding_bottom=&#8221;75&#8243;][vc_column][vc_column_text]<\/p>\n<h2>Why choose Kappa Data?<\/h2>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;20px&#8221;][vc_row_inner row_type=&#8221;row&#8221; type=&#8221;full_width&#8221; text_align=&#8221;left&#8221; css_animation=&#8221;&#8221;][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#f3f3f3&#8243; custom_class=&#8221;round&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h3>Technical expertise<\/h3>\n<p>Kappa data supports resellers and customers with extensive technical knowledge, training and guidance. Our certified technical and presales teams are always there for you![\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item horizontal_alignment=&#8221;left&#8221; advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 5% 10%&#8221; background_color=&#8221;#f3f3f3&#8243; custom_class=&#8221;round&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h3>Personal touch<\/h3>\n<p>At Kappa Data, you enjoy a particularly personal as well as professional approach, from quick quotes to demos and customer-friendly service with your regular contacts. We are there for you.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][vc_empty_space height=&#8221;30px&#8221; el_class=&#8221;onlyphone&#8221;][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item advanced_animations=&#8221;no&#8221; custom_class=&#8221;round&#8221; background_color=&#8221;#f3f3f3&#8243; item_padding=&#8221;5% 10% 5% 10%&#8221;][vc_empty_space height=&#8221;20px&#8221;][vc_column_text]<\/p>\n<h3>Outstanding service<\/h3>\n<p>Kappa Data is a value-added distributor that thinks solution-focused with you. We always ensure a good relationship between all parties and mediate conflicts where necessary.[\/vc_column_text][vc_empty_space height=&#8221;28px&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;center&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; padding_top=&#8221;75&#8243; padding_bottom=&#8221;75&#8243; background_color=&#8221;#f3f3f3&#8243;][vc_column width=&#8221;1\/6&#8243;][\/vc_column][vc_column width=&#8221;2\/3&#8243;][vc_column_text]<\/p>\n<h3>What our customers say<\/h3>\n<p>[\/vc_column_text][vc_column_text]&#8221;A more than reliable partner for more than 20 years.&#8221;<\/p>\n<p><span style=\"color: #c1d82f;\"><strong>Snijders Compuservice, Jef Snijders <\/strong><\/span>[\/vc_column_text][vc_empty_space height=&#8221;50px&#8221;]<a  itemprop=\"url\" href=\"#contact\" target=\"_self\"  class=\"qbutton  default\" style=\"\">Contact us!<\/a>[\/vc_column][vc_column width=&#8221;1\/6&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; padding_top=&#8221;50&#8243; padding_bottom=&#8221;20&#8243;][vc_column][vc_column_text]<\/p>\n<h3>Our partners<\/h3>\n<p>[\/vc_column_text]<div class='projects_holder_outer v5 portfolio_with_space portfolio_with_hover_text'>\n        <div class='projects_holder portfolio_main_holder clearfix v5  hover_text portfolio_full_image '>\n        \n        <article class='mix portfolio_category_100 portfolio_category_92 portfolio_category_49 portfolio_category_51 portfolio_category_117 portfolio_category_55 portfolio_category_102 portfolio_category_57 portfolio_category_63 portfolio_category_99 default' style=''>\n    \n    \n    \n    \n            <div class=\"item_holder grayscale\">\n\n                    <div class=\"text_holder\">\n        <div class=\"text_holder_outer\">\n            <div class=\"text_holder_inner\">\n                                        <div class=\"icons_holder\">\n\n                                \n                                        <a itemprop=\"url\" class=\"preview\" title=\"Go to Project \" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/cato-networks\/\" data-type=\"portfolio_list\" target=\"_self\" ><\/a>\n    \n                                <a data-type=\"icon\" href=\"#\" class=\"qode-like\" id=\"qode-like-7374\" title=\"Like this\" data-nonce=\"c9bf6a2719\"><\/a>\n                            <\/div>\n                                    <\/div>\n        <\/div>\n    <\/div>\n\n                                    <a itemprop=\"url\" class=\"portfolio_link_class\" title=\"Cato Networks\" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/cato-networks\/\"><\/a>\n                \n                <div style=\"background-color: rgba(255,255,255,0.25)\" class=\"portfolio_shader\"><\/div>\n                <div class=\"image_holder\">\n                    \n<span class='image'><img decoding=\"async\" width=\"960\" height=\"640\" src=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2024\/07\/Logo-vendor-Cato-1.png\" class=\"attachment-full size-full wp-post-image\" alt=\"\" srcset=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2024\/07\/Logo-vendor-Cato-1.png 960w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2024\/07\/Logo-vendor-Cato-1-300x200.png 300w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2024\/07\/Logo-vendor-Cato-1-768x512.png 768w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2024\/07\/Logo-vendor-Cato-1-700x467.png 700w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/span>                <\/div>\n            <\/div>\n\n        \n    \n<\/article>\n<article class='mix portfolio_category_45 portfolio_category_100 portfolio_category_49 portfolio_category_57 portfolio_category_103 portfolio_category_63 portfolio_category_105 portfolio_category_99 default' style=''>\n    \n    \n    \n    \n            <div class=\"item_holder grayscale\">\n\n                    <div class=\"text_holder\">\n        <div class=\"text_holder_outer\">\n            <div class=\"text_holder_inner\">\n                                        <div class=\"icons_holder\">\n\n                                \n                                        <a itemprop=\"url\" class=\"preview\" title=\"Go to Project \" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/sophos\/\" data-type=\"portfolio_list\" target=\"_self\" ><\/a>\n    \n                                <a data-type=\"icon\" href=\"#\" class=\"qode-like\" id=\"qode-like-2666\" title=\"Like this\" data-nonce=\"c9bf6a2719\"><\/a>\n                            <\/div>\n                                    <\/div>\n        <\/div>\n    <\/div>\n\n                                    <a itemprop=\"url\" class=\"portfolio_link_class\" title=\"Sophos\" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/sophos\/\"><\/a>\n                \n                <div style=\"background-color: rgba(255,255,255,0.25)\" class=\"portfolio_shader\"><\/div>\n                <div class=\"image_holder\">\n                    \n<span class='image'><img decoding=\"async\" width=\"960\" height=\"640\" src=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Kappa Data - Vendor - Sophos\" srcset=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos.png 960w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos-300x200.png 300w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos-768x512.png 768w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Sophos-700x467.png 700w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/span>                <\/div>\n            <\/div>\n\n        \n    \n<\/article>\n<article class='mix portfolio_category_41 portfolio_category_43 portfolio_category_89 portfolio_category_45 portfolio_category_47 portfolio_category_100 portfolio_category_92 portfolio_category_49 portfolio_category_51 portfolio_category_117 portfolio_category_55 portfolio_category_102 portfolio_category_57 portfolio_category_103 portfolio_category_63 portfolio_category_99 default' style=''>\n    \n    \n    \n    \n            <div class=\"item_holder grayscale\">\n\n                    <div class=\"text_holder\">\n        <div class=\"text_holder_outer\">\n            <div class=\"text_holder_inner\">\n                                        <div class=\"icons_holder\">\n\n                                \n                                        <a itemprop=\"url\" class=\"preview\" title=\"Go to Project \" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/barracuda-networks\/\" data-type=\"portfolio_list\" target=\"_self\" ><\/a>\n    \n                                <a data-type=\"icon\" href=\"#\" class=\"qode-like\" id=\"qode-like-2352\" title=\"Like this\" data-nonce=\"c9bf6a2719\"><\/a>\n                            <\/div>\n                                    <\/div>\n        <\/div>\n    <\/div>\n\n                                    <a itemprop=\"url\" class=\"portfolio_link_class\" title=\"Barracuda Networks\" href=\"https:\/\/www.kappadata.nl\/en\/vendors\/barracuda-networks\/\"><\/a>\n                \n                <div style=\"background-color: rgba(255,255,255,0.25)\" class=\"portfolio_shader\"><\/div>\n                <div class=\"image_holder\">\n                    \n<span class='image'><img decoding=\"async\" width=\"960\" height=\"640\" src=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Baracura.png\" class=\"attachment-full size-full wp-post-image\" alt=\"Kappa Data - Vendor - Baracura\" srcset=\"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Baracura.png 960w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Baracura-300x200.png 300w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Baracura-768x512.png 768w, https:\/\/www.kappadata.nl\/wp-content\/uploads\/2020\/11\/Kappa-Data-Vendor-Baracura-700x467.png 700w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/span>                <\/div>\n            <\/div>\n\n        \n    \n<\/article>\n        <div class='filler'><\/div>\n            <div class='filler'><\/div>\n            <div class='filler'><\/div>\n            <div class='filler'><\/div>\n            <div class='filler'><\/div>\n        <\/div>\n\n    \n    <\/div>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;full_width&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1672654277901{background-image: url(https:\/\/www.kappadata.be\/wp-content\/uploads\/2022\/11\/Fotos-banners-overlay-01.jpg?id=13234) !important;}&#8221; z_index=&#8221;&#8221;][vc_column][qode_elements_holder number_of_columns=&#8221;one_column&#8221;][qode_elements_holder_item advanced_animations=&#8221;no&#8221; item_padding=&#8221;5% 10% 10% 10%&#8221;][vc_column_text] Zero&#8211;Trust (Network Access)\u00a0 [\/vc_column_text][vc_column_text] Secure your corporate network against cybercriminals using Zero Trust Network Access. [\/vc_column_text][vc_empty_space height=&#8221;80px&#8221; el_class=&#8221;onlyphone&#8221;][\/qode_elements_holder_item][\/qode_elements_holder][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; background_color=&#8221;#f3f3f3&#8243;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":9390,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full_width.php","meta":{"_acf_changed":false,"rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-9908","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero-Trust (Network Access) | Kappa Data<\/title>\n<meta name=\"description\" content=\"How do you secure a cloud application accessed from home? Can malware just pop into a VPN tunnel with you and infect a remote network? Authentication (IAM) has the key and the lock, but then what is the box that provides the protection? Read all about ZTNA here and protect applications and users in our global environment.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero-Trust (Network Access) | Kappa Data\" \/>\n<meta property=\"og:description\" content=\"How do you secure a cloud application accessed from home? Can malware just pop into a VPN tunnel with you and infect a remote network? Authentication (IAM) has the key and the lock, but then what is the box that provides the protection? Read all about ZTNA here and protect applications and users in our global environment.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/\" \/>\n<meta property=\"og:site_name\" content=\"Kappa Data\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/kappadata\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-02T10:01:19+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/zero-trust-network-access\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/zero-trust-network-access\\\/\",\"name\":\"Zero-Trust (Network Access) | Kappa Data\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#website\"},\"datePublished\":\"2023-01-19T15:48:53+00:00\",\"dateModified\":\"2023-03-02T10:01:19+00:00\",\"description\":\"How do you secure a cloud application accessed from home? Can malware just pop into a VPN tunnel with you and infect a remote network? Authentication (IAM) has the key and the lock, but then what is the box that provides the protection? Read all about ZTNA here and protect applications and users in our global environment.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/zero-trust-network-access\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/zero-trust-network-access\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/zero-trust-network-access\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT solutions\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hot Topics\",\"item\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/solutions\\\/hot-topics\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zero-Trust (Network Access)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\",\"name\":\"Kappa Data\",\"description\":\"The Art of IT-infrastucture, security and IoT distribution\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#organization\",\"name\":\"Kappa Data\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Kappa-Data-600x120-Horizontaal-No-Base.png\",\"contentUrl\":\"https:\\\/\\\/www.kappadata.nl\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Kappa-Data-600x120-Horizontaal-No-Base.png\",\"width\":600,\"height\":120,\"caption\":\"Kappa Data\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kappadata.nl\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/kappadata\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/kappa-data-nederland\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero-Trust (Network Access) | Kappa Data","description":"How do you secure a cloud application accessed from home? Can malware just pop into a VPN tunnel with you and infect a remote network? Authentication (IAM) has the key and the lock, but then what is the box that provides the protection? Read all about ZTNA here and protect applications and users in our global environment.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/","og_locale":"en_US","og_type":"article","og_title":"Zero-Trust (Network Access) | Kappa Data","og_description":"How do you secure a cloud application accessed from home? Can malware just pop into a VPN tunnel with you and infect a remote network? Authentication (IAM) has the key and the lock, but then what is the box that provides the protection? Read all about ZTNA here and protect applications and users in our global environment.","og_url":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/","og_site_name":"Kappa Data","article_publisher":"https:\/\/facebook.com\/kappadata","article_modified_time":"2023-03-02T10:01:19+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/","url":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/","name":"Zero-Trust (Network Access) | Kappa Data","isPartOf":{"@id":"https:\/\/www.kappadata.nl\/en\/#website"},"datePublished":"2023-01-19T15:48:53+00:00","dateModified":"2023-03-02T10:01:19+00:00","description":"How do you secure a cloud application accessed from home? Can malware just pop into a VPN tunnel with you and infect a remote network? Authentication (IAM) has the key and the lock, but then what is the box that provides the protection? Read all about ZTNA here and protect applications and users in our global environment.","breadcrumb":{"@id":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/zero-trust-network-access\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kappadata.nl\/en\/"},{"@type":"ListItem","position":2,"name":"IT solutions","item":"https:\/\/www.kappadata.nl\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"Hot Topics","item":"https:\/\/www.kappadata.nl\/en\/solutions\/hot-topics\/"},{"@type":"ListItem","position":4,"name":"Zero-Trust (Network Access)"}]},{"@type":"WebSite","@id":"https:\/\/www.kappadata.nl\/en\/#website","url":"https:\/\/www.kappadata.nl\/en\/","name":"Kappa Data","description":"The Art of IT-infrastucture, security and IoT distribution","publisher":{"@id":"https:\/\/www.kappadata.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kappadata.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kappadata.nl\/en\/#organization","name":"Kappa Data","url":"https:\/\/www.kappadata.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Kappa-Data-600x120-Horizontaal-No-Base.png","contentUrl":"https:\/\/www.kappadata.nl\/wp-content\/uploads\/2023\/03\/Kappa-Data-600x120-Horizontaal-No-Base.png","width":600,"height":120,"caption":"Kappa Data"},"image":{"@id":"https:\/\/www.kappadata.nl\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/kappadata","https:\/\/www.linkedin.com\/company\/kappa-data-nederland\/"]}]}},"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/comments?post=9908"}],"version-history":[{"count":2,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9908\/revisions"}],"predecessor-version":[{"id":10074,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9908\/revisions\/10074"}],"up":[{"embeddable":true,"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/pages\/9390"}],"wp:attachment":[{"href":"https:\/\/www.kappadata.nl\/en\/wp-json\/wp\/v2\/media?parent=9908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}